Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
87cefef5222b9ed9b7c68569d21c4d9d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87cefef5222b9ed9b7c68569d21c4d9d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
87cefef5222b9ed9b7c68569d21c4d9d_JaffaCakes118.html
-
Size
1KB
-
MD5
87cefef5222b9ed9b7c68569d21c4d9d
-
SHA1
299ba347e78c0e9d694b24855aea4c294ad8bf78
-
SHA256
84fbe4ad32bdfc960b97658677d5d58525662e7ea8b2cf09181a6d2f8dde9bf0
-
SHA512
e6e82b38b79c43b302bf330812b12dc2f87c99b5fa0dc12d7e14ea9c3938f3f0938aa338fc7a3cc399245edda114044778ac9ef1efb19432e35b5af5f9a64b15
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89DFC5D1-5762-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000009a803492edab98a040a57e93112c520d679ddefd906d74ab9e5c76aa1a5a9697000000000e80000000020000200000005afe5b6ea68cbfcf6f2b646a7e83d5f976627df28b2ff9edd9528777e07a4492200000008811ea7fe9a9f1964081c987ad001e82a4531e95e7dae1b512efb438ca51b9fa40000000311ea4882887757b44ab3d301c79730dcd521fd92836561ecd2cace98e9d110b87b7a760cb7f3c682f7fce8513645374cea37342b57e01d9647480a7bf286e36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429488487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00457b676febda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2412 2968 iexplore.exe 30 PID 2968 wrote to memory of 2412 2968 iexplore.exe 30 PID 2968 wrote to memory of 2412 2968 iexplore.exe 30 PID 2968 wrote to memory of 2412 2968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\87cefef5222b9ed9b7c68569d21c4d9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ff035b9689e5857eff08fd0a996d81
SHA16c5bbe96d3d0d9345602ba93d286b754e497dab3
SHA256d2d720df8828596ac51b5cb1fd968d0b35d170f5a3ad9cf70ca95993d26dc117
SHA5120bd7587c647fcd6afdb82daf1331a9fc4d47cc5bfebc5d5ef164a83901f1946e26bc33ddaf529737bb3b1ea479c05f1ceba38d58ee2013bba4458c4e625ad325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58914cb90f9641c57d0214f5e35f1efa8
SHA1f7d302feb4042cfeeb5eb4aea4fb98380790d541
SHA256c6bead4e50121158eead306395f470bb7ac87fd483476e02d62c08c8fd60865e
SHA5120f8094863fbbfe651731796da1fb621b99c09c3ee2c843103b1465c13d77141e2d7085adc15e4718f7ae32cc03ac4344ac07ca623b0447126d8239454d60e572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0ba221aff3f0d73884f64a0a6409699
SHA138ceffdb8b09676f3e031b0b608a7b936a18738d
SHA256c6d2137b1c26853e2aa9786c293c79673401aa25e3f892caa7153765023ddad7
SHA512fbd5ffff3e8dbc425cc2efe78d9344de4eab0367153d51695ab29f69d134f4c867297f628d9a2e99c8df887bc0560315758c3d352b244cf5d326c8428f224409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe0d0dae0d655950dc1526bc001a4f8
SHA167628e10ab2dba84d714e8c0b67e11fb6663e7d1
SHA2563c2000da81c31cdc5765d5ab3c8c50eedc6ecd22f1c9cde9b89a5fff1acf8888
SHA512bdde2c59b68bfe1320a80ae0f8da2d28cede56a36f5cf744820caa7f88ddf561b71269ca8d54e42e57cdeb2983d1d7741496580b2cd366f119f3cc4b42c569bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2695ba6e56cf973c740e0beb071626
SHA11f4c2b8bfc6335b1682153fd940689ee7c5e3cd9
SHA2567f856096d606d2d133d88f09b8acf74127a6ad7d502a8fc984e8145b31a42a04
SHA5127cfb6618538ab38f9db74c54e57bfb491665aef033a24f89f73aeac8b05abb671bcd5c0488d34d5325b9b0e3064ea0fafd2a2f954fe23c560b297b76f3234b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54025d4e401d2a3ce5863b407427f40a0
SHA1ed9adfa7ddeb7b5ef91e30733ae98e9f63be2707
SHA2568e5fdcc9cffc763a32cb19972a8db7f29d9b0af1d2633dcfbc33de6312a73457
SHA5123d05c6983e0c49b6ef10fa65dc419887f72bbf72a16231b356c9355ea340a28fed4c6f7bdb92b2b7fc4a03815cdfe8bedc7ea2c5a7a073e2ecd3cebd6f7d8b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525563d6e616017b82e0d67d16890ed95
SHA13ad2588dbc3cffd81bd5e1b7c262040491fdb2e1
SHA2562e2b42b0bc122c9d86d1e4153da7170d62a3ac5dc7e4a7be9e61a52cadff03e1
SHA512ebe3bca5e8aff0f5e0769277f107298ad99f066918000469241aee2aaba35a78c5b7db8eb5ea544cef7454a90904111d32b01f2705c1d282951eed9118f8a66f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee69146955aedb65ff036280c9d5dc7
SHA14384ef7233df29074fac211b93e79d5357d52d0f
SHA256dc3bdfc924aa6a16ed182386ee96e37d3c5218f48f6e39b64536378522709d00
SHA5129ba3903e6a82d0188f7cd56a59289596094f511546129a06178718ef42cd7b70e9741f6149a3171d06b50f1dae51bdbb0b57a1444217e6f1463f5c0c0340e020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50504424b02ed9a2301ccafff9fd6e2c0
SHA11685d1818de72ed1ece52498a76dea0101175b2c
SHA256ad1d6263a810925ad8d13d25a8ebe79e606d7b5b9447b25cf0e4b7f26fa9bc5c
SHA51273e4bff73a0e95e4928328337187c52f89f083fcf172d37813d6508114842eb831fa29198b2f001060905628dcb9d74d499126705672cbbfe1662e7557ad2185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187983a0d1ee61ef2b57bb5ac4543ab3
SHA173844b833379562f3099188cd58dda776bab1fda
SHA256e547c523bd05eeb190fc5118a87a1c9241a529a0e7e41e05f495a2eb389ae32b
SHA512213071d9116262d4062a82c7ab66f85ab69af5ae15b8a4a3d728872651c8edbdc1ed8299bad2fe8cdd5b2678804605ffd04e5f0e60de448909e7704274f60451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9831f8d995042f3188a257d50e6c7d
SHA1dc9b6e65b9919938ae43d19bde2b2b2aa62d53b4
SHA2563bcfe9e6d35a1dfbd0033689b692b910b04c5d4b3181a1fc7799462faf139423
SHA5127239259fc9c8294edeae7a7f39648416c8eeb0ec259f8320c9d41e4d94828703b64743b130f10a17a4d60993e90643ef78e53ce0d75ba0be9c8566325a4a5623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934ba42369f723d8be807fe4a2901aee
SHA1c74e2b2fa756c4cfb8541a525aedd8477df5592e
SHA25606fc6486d30cd92c7ceb4811fad3aa7086563070ac8aa3e67cf387d008592c2c
SHA512077b88d969cae35ae900ee04ed6b9978563bd12c119693071cc4c163e332d9e6e3d61ddbf6c5e6e3287db51317c9559e4e22837fc051abd09d975e82771b6344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098f15850305016681726c1265009c90
SHA1e15111c5c5ed0d9de570bd71be759932f20c14f4
SHA25676fff7ce34560031331e8b9fdb47194f69f8c9d43f51c4f81d57c9fcadec0999
SHA51279794f848b9c6606e87016ce8468427a1f2b0cac21ce25e7a16fb39bcab4ac130f7fabc75568d66f70f27e13e7f298649f9226dfbcaa747bcf18da1a7e002f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58541232444398aaf999ebb2cff50628a
SHA17a8188d1b597cac0e96914715c0514c3dc834d21
SHA2568039bf30d066aa44e20da0b728bee5186270998b2f9d5ebd24a9ec13fb423067
SHA51288cc048aaae624609135618dbe04995476593987630f35bd32bb9e77889cfffd2da3f9764ab76d14d06e8dbc1590a9566825f40fcdf4a675913644961a6b3f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fd6b8d80743439a0f2f33d486ecbe2
SHA1ad58298d0165d246b4ae1650e7ad1acc29beb916
SHA256c2128ba345aeaa4d7c7ab36ba191da62c17a07c2f6fbfd9c8e34c52e67ba119e
SHA51298c8d686e8237fc7eb1e6d6640ec9a3bec3e80f942200d09ad928b61272d731a3071288ea672e6de7b999badfa5ac2431a3f6f8f4f442fa1f261118b6d745d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a007e0daa47ef7ed874f1d395a42db
SHA117c338e532df4e399ed49679e7f833888f141f48
SHA2566cbeacc17fce65ca05294604b883e46e95572668ca7a5e7b535e9d727f3a8f65
SHA512fb210d10ad8df0bf2744575b335c3880da0a573d2a4a83548211b9c290996e2937e190a5d573a0370ed97b4d8d181b0e2637182a9c70eb97b19883ab2bc68796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1433b422e99a77e885b3fc293a39dcb
SHA161ed3b1416a2b93c9646dfba4f2e311b5f9b2d5b
SHA25629127528dfa97764c4f1ea41769ed4c819505d9ec2809167fd80935367e14d21
SHA512471164e8e8f904cffe69323efa8d7fffdae079b4c46d060474dad98dfcafebe84c4cb985fdce6842a8bba5d99cd8f10274de93bbc0e4926cfcd3dac3c80d80aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9aa8d00bfec4b8b928db21db49275c
SHA1405fd4931218e2717e58b5ac6950462af5a9b1ef
SHA2560d56a77b2a3f13ff872c79be4fac91d52d34ab81240eac28db4d737453d641c5
SHA512fef846b42ab2cabba8b6c9b2639853d69f0251c90b1c14837ec841aae5cf09cc58c2c889d355417ead5559587e3ede3d4465441c090b82c8b9fafa1fa720f999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba06ef1519196f6fd85d97373bdfde2
SHA1ccca7d415ce8629d31335e4aabc3743f9080f8ec
SHA2561f04b466294982e935cac836a2cf2701be81c71b4271101278d70af284f8dd4f
SHA512401ccdfbf06f11b8c825253da92e0bbcc151565e9ccae05fdf1c30fdbf372dea480e831949b277a21fdcff0c77cbded40f18110c7370081afa5531e6c7e2dc8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b